OpenScape 4000 V7, VHG 3500 HFA For OpenScape 4000 SoftGate, Administrator Documentation, Issue 2 PDF
OpenScape 4000 V7, VHG 3500 HFA For OpenScape 4000 SoftGate, Administrator Documentation, Issue 2 PDF
OpenScape 4000 V7, VHG 3500 HFA For OpenScape 4000 SoftGate, Administrator Documentation, Issue 2 PDF
A31003-H3170-M103-2-76A9
Our Quality and Environmental Management Systems are
implemented according to the requirements of the ISO9001 and
ISO14001 standards and are certified by an external certification
company.
Copyright © Unify GmbH & Co. KG 04/2014
Hofmannstr. 51, 81379 Munich/Germany
All rights reserved.
Reference No.: A31003-H3170-M103-2-76A9
The information provided in this document contains merely general descriptions or
characteristics of performance which in case of actual use do not always apply as
described or which may change as a result of further development of the products.
An obligation to provide the respective characteristics shall only exist if expressly agreed in
the terms of contract.
Availability and technical specifications are subject to change without notice.
Unify, OpenScape, OpenStage and HiPath are registered trademarks of Unify GmbH & Co. KG.
All other company, brand, product and service names are trademarks or registered trademarks
of their respective holders.
unify.com
v3575_v3500hfa_TOC.fm
Nur für den internen GebrauchOpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate - Contents
A31003-H3170-M103-2-76A9, 04/2014
OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation 3
v3575_v3500hfa_TOC.fm
OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate - Contents Nur für den internen
A31003-H3170-M103-2-76A9, 04/2014
4 OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation
v3575_v3500hfa_11.fm
Introduction and Important Notes
Target Audience for this Manual
The vHG 3500 HFA (virtual HG 3500 HFA = virtual STMI) is the central controller
for IPDA (IP Distributed Architecture) in the OpenScape 4000 SoftGate.
• OpenScape 4000 V7
They should have received instruction on the following for vHG 3500 HFA and
OpenScape 4000 SoftGate:
A31003-H3170-M103-2-76A9, 04/2014
OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation 5
v3575_v3500hfa_11.fm
Introduction and Important Notes
Contents of this Manual
IMPORTANT: After changing any Internet Explorer security settings for a WBM
page (like adding the page in Trusted Sites), it is recommended to restart the
browser in order to work correctly with the new settings.
Convention Example
Courier Input and output
Example: Enter LOCAL as the file name.
Command not found
Italic Variable
Example: Name can contain up to eight characters.
Italic User interface elements
Example: Click OK.
Section 1.4, “Conventions Used” Cross-reference
Configuration User interface elements as cross references
Bold Special emphasis
Example: This name must not be deleted.
<Courier> Keyboard shortcuts
Example: <CTRL>+<ALT>+<ESC>
> Menu sequence
Example: WBM > Configuration
Designates situations that may result in property
IMPORTANT: damage or loss of data.
A31003-H3170-M103-2-76A9, 04/2014
6 OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation
v3575_v3500hfa_12.fm
vHG 3500 HFA for OpenScape 4000 SoftGate WBM
The WBM user interface is available in German and English. You can switch
languages using the Language setting on your Web browser.
A31003-H3170-M103-2-76A9, 04/2014
OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation 7
v3575_v3500hfa_12.fm
vHG 3500 HFA for OpenScape 4000 SoftGate WBM
Hardware and Software Requirements
2.1.1 Hardware
You need an administration PC with the following minimum configuration for
WBM:
2.1.2 Software
The vHG 3500 HFA WBM consists of HTML/XSL pages with frames. The require-
ments for using it are:
Other browsers which support frames, Java and JavaScript may also be
compatible with WBM. Browsers which do not support frames cannot be used
with WBM.
A31003-H3170-M103-2-76A9, 04/2014
8 OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation
v3575_v3500hfa_12.fm
vHG 3500 HFA for OpenScape 4000 SoftGate WBM
Hardware and Software Requirements
b) Click Add. The WBM IP address is added to the Websites you've added
to Compatibility View list.
c) Click Close.
Enabling Java
Tools > Internet Options > Security tab > Local intranet Web content zone > click
Custom Level... > Scripting > Active Scripting > Enable
Tools > Internet Options > Connections > LAN Settings > LAN Settings... button
> Proxy server > activate Bypass proxy server for local address
1. Tools > Internet Options > Security tab > Trusted sites Web content zone
> click Sites > enter the WBM URL in Add this website to the zone > click
Add, enable the check box Require server verification (https:) for all sites
in this zone
2. Tools > Internet Options > Security tab > Trusted sites Web content zone
> click Custom Level... > Download > File download > Enable
When you have made all these settings, close Internet Explorer and restart it.
A31003-H3170-M103-2-76A9, 04/2014
OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation 9
v3575_v3500hfa_12.fm
vHG 3500 HFA for OpenScape 4000 SoftGate WBM
Starting and Finishing WBM
1. Log in to OpenScape 4000 Assistant using your user name and password.
2. In the hierarchy, select OpenScape 4000 Assistant > Expert Mode > Gateway
Dashboard. The Gateway Dashboard window is displayed with the existing
boards:
3. In the line for the required vHG 3500 HFA (e.g. vHG 3500 - HG 3530) in the
Remote access column, click [WBM] [N/A]. You need to know the
vHG 3500 HFA IP address.
A31003-H3170-M103-2-76A9, 04/2014
10 OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation
v3575_v3500hfa_12.fm
vHG 3500 HFA for OpenScape 4000 SoftGate WBM
Starting and Finishing WBM
The vHG 3500 HFA WBM Web server is contacted. Since the server only
works with HTTPS (secure data transmission), it sends a certificate.
NOTE: You may see a message in Explorer 8 to the effect that there is a
problem with the security certificate for the website. In this case, click
Continue to this website.
5. Test whether you are in the vHG 3500 HFA WBM (e.g. SoftGate-HFA).
6. You can now use the Configuration and Maintenance modules to administer
vHG 3500 HFA.
The default user name is TRM and the default password is HICOM (as configured
in AMO STMIB). You can modify these defaults in AMO STMIB.
A31003-H3170-M103-2-76A9, 04/2014
OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation 11
v3575_v3500hfa_12.fm
vHG 3500 HFA for OpenScape 4000 SoftGate WBM
Starting and Finishing WBM
2. In the address bar of your browser, enter the vHG 3500 HFA WBM URL, in
the format: https://999.999.999.999. The WBM Web server is contacted.
Since the server only works with HTTPS (secure data transmission), it sends
a certificate.
A31003-H3170-M103-2-76A9, 04/2014
12 OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation
v3575_v3500hfa_12.fm
vHG 3500 HFA for OpenScape 4000 SoftGate WBM
Starting and Finishing WBM
4. Enter the user name and password. Click Login. The vHG 3500 HFA WBM
homepage is displayed:
5. You can now use the Configuration and Maintenance modules to administer
vHG 3500 HFA.
A31003-H3170-M103-2-76A9, 04/2014
OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation 13
v3575_v3500hfa_12.fm
vHG 3500 HFA for OpenScape 4000 SoftGate WBM
WBM User Interface
Control area
Menu area
This area is used to navigate within a module. The menus that are displayed here
vary depending on the module selected.
Module area
This area shows the modules available. These modules are: Configuration,
Maintenance, Help and Logoff. Click the module name to display the corre-
sponding menu entries in the menu area.
A31003-H3170-M103-2-76A9, 04/2014
14 OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation
v3575_v3500hfa_12.fm
vHG 3500 HFA for OpenScape 4000 SoftGate WBM
WBM User Interface
Control area
Status information is constantly displayed at the lower edge of your screen. For
information on the meaning of the icons, see Section 2.3.2, “Icons in the WBM
Window’s Control Area”.
Gray/blue: Data entry is blocked. Users can read data but cannot
modify.
The icon turns green to indicate a connection to the WBM Web server. The icon
flashes red when there is no connection set up.
A31003-H3170-M103-2-76A9, 04/2014
OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation 15
v3575_v3500hfa_12.fm
vHG 3500 HFA for OpenScape 4000 SoftGate WBM
WBM User Interface
Input fields
Dropdown lists
Click the arrow to open or close the list. Select an entry with
a left-click.
Check boxes
(Here, the upper check box is disabled while the lower one is
enabled): The relevant field label is displayed before, after or
over the field. Click to enable or disable the relevant option.
Multiple check boxes can be enabled.
Radio buttons
(Here, the upper check box is disabled while the lower one is
enabled): Radio buttons are combined in groups where one
element is always selected and all others deselected. The
relevant field label is displayed before, after or over the field.
Click to enable the corresponding function.
Arrows
(in the figures to the left: top figure = menu closed; bottom
figure = menu open): In the menu area, you can click these
arrows to open or close a menu. Multiple menus can be
opened.
A31003-H3170-M103-2-76A9, 04/2014
16 OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation
v3575_v3500hfa_12.fm
vHG 3500 HFA for OpenScape 4000 SoftGate WBM
WBM User Interface
Menu items
(in the figures to the left: top figure = menu item inactive;
bottom figure = menu item active): Click the menu items to
display the corresponding dialogs. Inactive menu items are
black; active menu items are gray.
A31003-H3170-M103-2-76A9, 04/2014
OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation 17
v3575_v3500hfa_12.fm
vHG 3500 HFA for OpenScape 4000 SoftGate WBM
WBM User Interface
A31003-H3170-M103-2-76A9, 04/2014
18 OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation
v3575_v3500hfa_13.fm
Configuration
3 Configuration
WBM path
WBM > Configuration
You can use the Configuration module for defining the vHG 3500 HFA gateway
properties (Basic Settings) and administering the Signaling & Payload Encryption
(SPE) feature.
A31003-H3170-M103-2-76A9, 04/2014
OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation 19
v3575_v3500hfa_13.fm
Configuration
Basic Settings
WBM path
WBM > Configuration > Basic Settings
3.1.1 Gateway
WBM path
WBM > Configuration > Basic Settings > Gateway
The Gateway Properties dialog is displayed:
Input fields
The following input fields are shown in this dialog:
• System Name: Enter the vHG 3500 HFA name in this field, e. g. if multiple
vHG 3500 HFA systems are operated on a single OpenScape 4000
SoftGate.
• Gateway Location: Enter the vHG 3500 HFA location in this field.
Buttons
The following buttons are shown in this dialog:
A31003-H3170-M103-2-76A9, 04/2014
20 OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation
v3575_v3500hfa_13.fm
Configuration
Basic Settings
• Undo: The entries made are deleted and replaced by default values.
A31003-H3170-M103-2-76A9, 04/2014
OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation 21
v3575_v3500hfa_13.fm
Configuration
SPE
3.2 SPE
SPE (Signaling & Payload Encryption) encrypts VoIP payload and signaling data
streams to and from vHG 3500 HFA. This feature is based on an asymmetric
encryption process. Public and private keys are used for this type of process.
The individual VoIP clients and gateways, e. g. vHG 3500 HFA, must be identi-
fiable in the communication system. This is achieved using certificates containing
private or public keys. Certificates are created either by a customer PKI certifi-
cation authority (RA/CA) or by the DLS server’s internal certification authority
(CA). The DLS server sends the files containing these certificates to the gateway
DLS client.
WBM path
WBM > Configuration > SPE
SPE menu
The following options are shown in this menu:
Import Keycert
Show Keycert
Delete Keycert
Policy
NOTE: When you import a certificate for the first time with active SPE, a reset is
automatically performed.
WBM path
WBM > Configuration> SPE > Import Keycert
A31003-H3170-M103-2-76A9, 04/2014
22 OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation
v3575_v3500hfa_13.fm
Configuration
SPE
In this dialog, you can import an SPE key certificate by entering the decryption
password and the file name. The file containing the certificate originates from a
customer PKI certification authority (RA/CA) or the internal DLS server certifi-
cation authority (CA) and must be available in PEM or PKCS#12 format.
Input fields
The following input fields are shown in this dialog:
• Passphrase for decryption: Enter the password used when creating the PEM
or PKCS#12 file in this field.
• File with certificate and private Key (PEM or PKCS#12 format): Enter the path
and name of the file containing the certificate in this input field. You can also
click Browse to select the file.
Buttons
The following buttons are shown in this dialog:
• Import Certificate from File: The certificate is imported from the file specified
in the above input field.
Procedure
To load an SPE certificate, perform the following steps:
1. Select: WBM > Configuration > SPE > Import Keycert. The Load a SPE Key
Certificate via HTTP is displayed. You can edit the following fields:
• Passphrase for decryption: Enter the password used when creating the
PEM or PKCS#12 file in this field.
• File with certificate and private Key (PEM or PKCS#12 format): Enter the
path and file name of the file containing the certificate data you wish to
import. Click Browse to open a dialog to search for the file.
A31003-H3170-M103-2-76A9, 04/2014
OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation 23
v3575_v3500hfa_13.fm
Configuration
SPE
3. Click Import Certificate from File if you are satisfied with your examination of
the fingerprint. Do not import the certificate if the fingerprint does not satisfy
your expectations.
In this dialog, you can see the SPE certificate, e. g. to test it.
A31003-H3170-M103-2-76A9, 04/2014
24 OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation
v3575_v3500hfa_13.fm
Configuration
SPE
Displayed data
The following certificate data is displayed:
• Public Key Encryption Data: Public Key Length, Public Key, Fingerprint
In this dialog, you can remove the SPE certificate, e. g. if a new certificate is
required.
Buttons
The following buttons are shown in this dialog:
Procedure
To remove an SPE certificate, perform the following steps:
A31003-H3170-M103-2-76A9, 04/2014
OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation 25
v3575_v3500hfa_13.fm
Configuration
SPE
1. Select: WBM > Configuration> SPE > Delete Keycert. A warning is displayed.
The name of the certificate is specified for inspection purposes.
3.2.4 Policy
WBM path
WBM > Configuration > SPE > Policy
In this dialog, the security settings for Signaling and Payload Encryption (SPE)
can be adapted to the customer’s security requirements. This affects the
encryption of signaling and payload data in communication between the
vHG 3500 HFA and the VoIP clients, or between two vHG 3500 HFA systems.
• Minimal length of RSA keys: You can select 512, 1024 and 2048. The larger
the value, the more secure the key.
• Maximum Re-Keying interval [hours]: This value specifies the length of time
a specific key should be used for encrypting signaling and payload data.
When this time has elapsed, a new key is defined.
A31003-H3170-M103-2-76A9, 04/2014
26 OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation
v3575_v3500hfa_13.fm
Configuration
SPE
Buttons
The following buttons are shown in this dialog:
• Undo: The entries made are deleted and replaced by default values.
Procedure
To modify SPE security settings, perform the following steps:
1. Select: WBM > Configuration> SPE > Policy. The Edit SPE Security Setup
dialog is displayed.
2. Make the required settings, see section "Dropdown lists, input fields, check
boxes".
3. Click Apply and then click OK in the confirmation dialog. The modified data is
accepted into the configuration.
A31003-H3170-M103-2-76A9, 04/2014
OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation 27
v3575_v3500hfa_13.fm
Configuration
SPE
A31003-H3170-M103-2-76A9, 04/2014
28 OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation
v3575_v3500hfa_14.fm
Maintenance
4 Maintenance
The Maintenance module provides features for maintaining and administering
vHG 3500 HFA. These features include software updating, saving configurations
and creating a secure trace.
WBM path
WBM > Maintenance
A31003-H3170-M103-2-76A9, 04/2014
OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation 29
v3575_v3500hfa_14.fm
Maintenance
SW-Update
4.1 SW-Update
The SW-Update menu (SW: software) provides functions for displaying the
software version, for updating software and for activating software in
vHG 3500 HFA.
WBM path
WBM > Maintenance > SW-Update
SW-Update menu
The following options are shown in this menu:
Show SW-Version
This dialog contains details on the currently installed software version of the
vHG 3500 HFA application. The following information is displayed: Software
Version, Loadware Name, Loadware Full Version, Loadware Variant, APS
Version, IMS SVN Version, SoftGate SVN Version, ITIL Version.
A31003-H3170-M103-2-76A9, 04/2014
30 OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation
v3575_v3500hfa_14.fm
Maintenance
Backup/Restore
4.2 Backup/Restore
In the Backup/Restore menu, you can backup (export) the vHG 3500 HFA
security configuration locally. This local backup can be loaded (imported) and
activated.
WBM path
WBM > Maintenance > Backup/Restore
Backup/Restore menu
The following options are shown in this menu:
Export Config
Export Sec Config
Import Config
Import Sec Config
You can backup (export) the vHG 3500 HFA configuration locally using this
dialog.
Buttons
The following buttons are shown in this dialog:
Procedure
To export the configuration, follow these steps:
A31003-H3170-M103-2-76A9, 04/2014
OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation 31
v3575_v3500hfa_14.fm
Maintenance
Backup/Restore
2. Click Save and select the folder where you wish to store the file. Then click
OK. The ZIP file is saved.
You can backup (export) the vHG 3500 HFA security configuration locally using
this dialog.
Buttons
The following buttons are shown in this dialog:
Procedure
To export the security configuration, follow these steps:
2. Click Save and select the folder where you wish to store the file. Then click
OK. The ZIP file is saved.
A31003-H3170-M103-2-76A9, 04/2014
32 OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation
v3575_v3500hfa_14.fm
Maintenance
Backup/Restore
In this dialog, you can import the vHG 3500 HFA configuration saved locally.
Input field
This dialog contains the following input field:
• Filename: Enter the path and file name where the configuration you wish to
import is stored in this field. You can also click Browse to select the file.
Buttons
The following buttons are shown in this dialog:
• Load: The specified file is loaded.
• Undo: The path and file name entered are deleted.
Procedure
Proceed as follows to import the configuration:
1. Enter the path and file name where the configuration you wish to import is
stored or click Browse to select the file.
2. Click Load. The file is loaded.
A31003-H3170-M103-2-76A9, 04/2014
OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation 33
v3575_v3500hfa_14.fm
Maintenance
Backup/Restore
In this dialog, you can import the vHG 3500 HFA security configuration saved
locally.
Input field
This dialog contains the following input field:
• Filename: Enter the path and file name where the security configuration you
wish to import is stored in this field. You can also click Browse to select the
file.
Buttons
The following buttons are shown in this dialog:
• Load: The specified file is loaded.
• Undo: The path and file name entered are deleted.
Procedure
Proceed as follows to import the security configuration:
1. Enter the path and file name where the security configuration you wish to
import is stored or click Browse to select the file.
2. Click Load. The file is loaded.
A31003-H3170-M103-2-76A9, 04/2014
34 OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation
v3575_v3500hfa_14.fm
Maintenance
Secure Trace
The secure trace contains encrypted records. These records can be decrypted by
developers using a key.
WBM path
WBM > Maintenance > Secure Trace
2. The customer is informed of this need and must confirm that they have been
informed. The customer orders the creation of a secure trace, including the
date and time when the monitoring should start and end.
• The certificate with the private key is strictly confidential and can only be
used by authorized developers.
• The certificate with the public key is provided to the service technician or
can be downloaded from the Hi Sat home page (https://hisat.global-
intra.net/wiki/index.php/SecureTrace).
A31003-H3170-M103-2-76A9, 04/2014
OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation 35
v3575_v3500hfa_14.fm
Maintenance
Secure Trace
4. The service technician informs the customer about the beginning of trace
activities. The customer must inform the affected users.
5. The service technician supplies the certificate to the vHG 3500 HFA gateway
for which the secure trace is being created; see Section 4.3.1, “Import certif-
icate”.
6. The service technician activates the secure trace function; see Section 4.3.4,
“Start Trace”. A secure trace is created. The activation and later deactivation
(Section 4.3.5, “Stop Trace”) are logged by the communication systems
involved.
7. After a secure trace has been created, the customer is informed about the
end of trace activities. The service technician removes the certificate from the
system.
8. The secure trace is provided to the developer.
9. The developer decrypts the secure trace using the private key. The developer
then analyzes the decrypted records.
10. After the analysis is complete, all relevant materials and data must be
securely destroyed. This includes the destruction of the private key,
preventing unauthorized copies of the secure trace from being decrypted.
The Load the Secure Trace Certificate via HTTP dialog is displayed:
You can import a secure trace certificate using this dialog. This certificate is a
requirement for creating a secure trace. The service technician receives it from
the developer. It contains the public key and must be available in PEM or binary
format. The certificate is always valid for a maximum of one month.
A31003-H3170-M103-2-76A9, 04/2014
36 OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation
v3575_v3500hfa_14.fm
Maintenance
Secure Trace
Input field
This dialog contains the following input field:
• Certificate file (PEM or binary): Enter the path and name of the file containing
the certificate in this input field. You can also click Browse to select the file.
Buttons
The following buttons are shown in this dialog:
• Import Certificate from File: The certificate is imported from the file specified
in the above input field.
Procedure
Proceed as follows to import the certificate:
1. Select: WBM > Maintenance > Secure Trace > Import certificate. The Load
the Secure Trace Certificate via HTTP dialog is displayed.
2. Click Browse to select the file containing the certificate and confirm by clicking
Open. The file is loaded.
4. Click Import Certificate from File if you are satisfied with your examination of
the fingerprint. Do not import the certificate if the fingerprint does not satisfy
your expectations.
A31003-H3170-M103-2-76A9, 04/2014
OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation 37
v3575_v3500hfa_14.fm
Maintenance
Secure Trace
In this dialog, you can see the secure trace certificate, e. g. to test it.
Displayed data
The following certificate data is displayed:
• Public Encryption Key Data: Public Key Length, Public Key, Fingerprint
4.3.3 State
WBM path
WBM > Maintenance > Secure Trace > State
A31003-H3170-M103-2-76A9, 04/2014
38 OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation
v3575_v3500hfa_14.fm
Maintenance
Secure Trace
In this dialog, you can find out whether a secure trace is being created.
Displayed data
The following data is displayed:
• Secure Trace is active: This line shows if a secure trace is currently being
created.
• Automatic Deactivation Time: This line shows when the secure trace is to be
created and when the secure trace function will be automatically deactivated.
• Secure Trace for these protocols: This line shows the protocols for which the
secure trace was created. These may be: Media Server (SRTP).
A31003-H3170-M103-2-76A9, 04/2014
OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation 39
v3575_v3500hfa_14.fm
Maintenance
Secure Trace
You can start the secure trace in this dialog. The following requirements must be
met:
• The customer has authorized the creation of a secure trace and wishes to
enter their Secure Trace Activation Passphrase in the WBM.
• You have received a public key from the developer and loaded it to the WBM.
– Duration of Secure Trace (Mins.): You must enter the duration of the
secure trace in minutes.
Buttons
The following button is shown in this dialog:
• Start Secure Trace: This starts the secure trace. The requirements named in
this document must be fulfilled to start the secure trace.
Procedure
Proceed as follows to start the secure trace:
2. Select: WBM > Maintenance > Secure Trace > Start Trace. The Start Secure
Trace dialog is displayed.
3. In the Start Parameters area, enter the Secure Trace Activation Passphrase
and the Duration of Secure Trace (Mins.).
5. Click the Start Secure Trace button. The secure trace is created for the
duration specified.
A31003-H3170-M103-2-76A9, 04/2014
40 OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation
v3575_v3500hfa_14.fm
Maintenance
Secure Trace
In this dialog, you can stop an active secure trace, even if the duration specified
under Start Trace has not yet elapsed.
Buttons
The following button is shown in this dialog:
A31003-H3170-M103-2-76A9, 04/2014
OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation 41
v3575_v3500hfa_14.fm
Maintenance
DLS Client
WBM path
WBM > Maintenance > DLS Client
Bootstrapping
A reliable, certificate-based SSL connection is established between the DLS
server and DLS client as a result of bootstrapping.
Based on a connection request from the DLS client to a DLS server as well as the
subsequent response - i.e. still an unreliable connection - a reliable connection is
established through the alternating authentication and the exchange of certifi-
cates (i. e. bootstrapping = a simple system develops inherently into a complex
system).
Because a different DLS server can respond to the connection request from the
DLS client instead of the desired DLS server in order to take the desired
connection for itself, security measures must be put in place. The DLS server (i.e.
its IP address and port) that is to contact the DLS client can be administered using
the AMO.
The certificates are exchanged once the reliable connection has been estab-
lished, see below.
A31003-H3170-M103-2-76A9, 04/2014
42 OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation
v3575_v3500hfa_14.fm
Maintenance
DLS Client
The PKCS#12 file sent from the DLS server to the DLS client contains the DLSC
client certificate, the private key included in it and the certificates of the DLS
server's certification authority (DLSC CA certificate). The DLS server can read all
certificates it delivers apart from the private key.
Once the IP address and port of the DLS server have been set, another attempt
is made when the system reboots (and each subsequent reboot) to initiate
bootstrapping by sending a connection request.
Other connection setup attempts can be initiated manually with the contact DLS
menu option. If bootstrapping has still not been performed, it is initiated automat-
ically, otherwise it is simply checked whether the DLS is accessible.
WBM path
WBM > Maintenance > DLS Client > DLS Settings
A31003-H3170-M103-2-76A9, 04/2014
OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation 43
v3575_v3500hfa_14.fm
Maintenance
DLS Client
Input field
The following input field is shown in the Current DLS Client Basic Configuration
area:
• Time interval for ContactMe Response: Amount of time the DLS client waits
after sending its connection request to receive the ContactMe response from
the DLS server. The wait time must be restricted so that ContactMe
responses cannot be intercepted by unwanted DLS servers.
Displays
The following displays are shown in this dialog:
– PIN required for DLS Bootstrapping: The PIN can be entered under the
menu option Enter PIN.
Yes: A PIN was entered.
No: No PIN was entered.
– Port of DLS Server: The port of the DLS server for bootstrapping mode
can be configured using the AMO. You must reboot vHG 3500 HFA.
– Secure Port of DLS Server: vHG 3500 HFA port for secure connection to
the DLS server.
A31003-H3170-M103-2-76A9, 04/2014
44 OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation
v3575_v3500hfa_14.fm
Maintenance
DLS Client
Buttons
The following buttons are shown in this dialog:
• Undo: The modified settings are rejected and the settings are reset to the
default value.
The bootstrap PIN generated randomly by the DLS server can be entered in this
dialog.
Input field
The following input field is shown in this dialog:
• Bootstrap PIN: If a PIN was entered in this input field and saved by clicking
Apply, the Edit DLS Client Basic Setup dialog (menu option DLS Settings)
shows that a PIN is required for DLS bootstrapping.
Buttons
The following buttons are shown in this dialog:
• Undo: The modified settings are rejected and the settings are reset to the
default value.
A31003-H3170-M103-2-76A9, 04/2014
OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation 45
v3575_v3500hfa_14.fm
Maintenance
DLS Client
Button
The following button is shown in this dialog:
WBM path
WBM > Maintenance > DLS Client > Contact DLS
Button
The following button is shown in this dialog:
A31003-H3170-M103-2-76A9, 04/2014
46 OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation
v3575_v3500hfa_14.fm
Maintenance
DLS Client
WBM path
WBM > Maintenance > DLS Client > DLSC Keycert
WBM path
WBM > Maintenance > DLS Client > DLSC Keycert > "0. DLSC Keycert", "1.
DLSC Keycert", etc.
A31003-H3170-M103-2-76A9, 04/2014
OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation 47
v3575_v3500hfa_14.fm
Maintenance
DLS Client
Data displayed
The following data from the certificate is shown:
• Public Key Encryption Data: Public Key Length (parameter), Public Key,
Fingerprint
WBM path
WBM > Maintenance > DLS Client > DLSC CA certs
WBM path
WBM > Maintenance > DLS Client > DLSC Keycert > "0. DLSC CA cert", "1.
DLSC CA cert", etc.
A31003-H3170-M103-2-76A9, 04/2014
48 OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation
v3575_v3500hfa_14.fm
Maintenance
DLS Client
Data displayed
The following data from the certificate is shown:
• Public Key Encryption Data: Public Key Length (parameter), Public Key,
Fingerprint
A31003-H3170-M103-2-76A9, 04/2014
OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation 49
v3575_v3500hfa_14.fm
Maintenance
DLS Client
A31003-H3170-M103-2-76A9, 04/2014
50 OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation
v3575_v3500hfa_15.fm
Help
5 Help
The administrator documentation is available in the Help module.
WBM path
WBM > Help
A31003-H3170-M103-2-76A9, 04/2014
OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation 51
v3575_v3500hfa_15.fm
Help
A31003-H3170-M103-2-76A9, 04/2014
52 OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation
v3575_v3500hfa_16.fm
Logoff
6 Logoff
The vHG 3500 HFA connection is cleared down when you click Logoff and the
WBM session is ended.
WBM path
WBM > Logoff
A31003-H3170-M103-2-76A9, 04/2014
OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation 53
v3575_v3500hfa_16.fm
Logoff
A31003-H3170-M103-2-76A9, 04/2014
54 OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation
v3575_v3500hfa_IX.fm
Nur für den internen Gebrauch Index
A31003-H3170-M103-2-76A9, 04/2014
OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation 55
v3575_v3500hfa_IX.fm
Index Nur für den internen Gebrauch
Policy 26
Show Keycert 24
Start trace 39
Starting WBM 12
State 38
STMI 5, 7
Stop trace 41
SW-Update 30
System Name 20
T
Target audience 5
TCP/IP 7
Temporary Internet files 9
U
User account 11
User name 11
W
WBM 7
basics 7
control area 15
control icons 15
dialog and input area 15
dialog elements 16
finishing 13
function area 14
icons 15
menu area 14
starting 12
user interface 14
WBM user interface 14
Windows 8
A31003-H3170-M103-2-76A9, 04/2014
56 OpenScape 4000 V7, vHG 3500 HFA for OpenScape 4000 SoftGate, Administrator Documentation